Filters








72 Hits in 6.4 sec

Hippocratic Databases [chapter]

Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu
2002 VLDB '02: Proceedings of the 28th International Conference on Very Large Databases  
We propose a strawman design for Hippocratic databases, identify the technical challenges and problems in designing such databases, and suggest some approaches that may lead to solutions.  ...  Our hope is that this paper will serve to catalyze a fruitful and exciting direction for future database research.  ...  Acknowledgment We would like to thank Don Haderle for suggesting that we focus on the principles underlying the current privacy laws and regulations to drive the design of the Hippocratic database.  ... 
doi:10.1016/b978-155860869-6/50021-4 dblp:conf/vldb/AgrawalKSX02 fatcat:muvxqffmivd4dki56dnpodw2fq

Database security - concepts, approaches, and challenges

E. Bertino, R. Sandhu
2005 IEEE Transactions on Dependable and Secure Computing  
We focus on access control systems, on which a large body of research has been devoted, and describe the key access control models, namely, the discretionary and mandatory access control models, and the  ...  role-based access control (RBAC) model.  ...  IT, Human, Legal, and Economic Perspectives," by an IBM Fellowship, and by the sponsors of CERIAS.  ... 
doi:10.1109/tdsc.2005.9 fatcat:6r3s2k2l25cdpgawjmp3rgtfue

Access Control for Databases: Concepts and Systems

Elisa Bertino
2010 Foundations and Trends in Databases  
We then briefly discuss issues concerning the application of MAC models to object databases, and we conclude by covering access control models and systems for XML data, for geographical data, and for digital  ...  The use of such access control model for databases requires addressing several challenging issues.  ... 
doi:10.1561/1900000014 fatcat:trrsnypzyvcq5phpgvee7dumva

Database Security: A Historical Perspective [article]

Paul Lesov
2010 arXiv   pre-print
Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security.  ...  Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to  ...  While access control for file systems was well established an access control for DBMS did not fit well with that model.  ... 
arXiv:1004.4022v1 fatcat:qosmugsvkzh4pmaeiqj2ysq3ay

Engineering a Policy-Based System for Federated Healthcare Databases

Rafae Bhatti, Arjmand Samuel, Mohamed Eltabakh, Haseeb Amjad, Arif Ghafoor
2007 IEEE Transactions on Knowledge and Data Engineering  
of user and environment context in the access control mechanism for personal healthcare information management.  ...  Although the work on privacy languages and enforcement mechanisms, such as Hippocratic databases, has advanced our understanding of designing privacy-preserving policies for healthcare databases, the need  ...  Although the work on privacy languages and enforcement mechanisms, such as Hippocratic databases, has advanced our understanding of designing privacy-preserving policies for healthcare databases, the need  ... 
doi:10.1109/tkde.2007.1050 fatcat:47r5pichlfct7bpshj53a54y7u

Limiting Disclosure in Hippocratic Databases [chapter]

K LEFEVRE, R AGRAWAL, V ERCEGOVAC, R RAMAKRISHNAN, Y XU, D DEWITT
2004 Proceedings 2004 VLDB Conference  
We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semantic tradeoffs introduced  ...  Through a comprehensive set of performance experiments, we show that the cost of privacy enforcement is small, and scalable to large databases.  ...  about choice storage and query modification, and to Ameet Kini and Diana Zhou for their work on the prototype implementation.  ... 
doi:10.1016/b978-012088469-8/50013-9 fatcat:q5iwycozozhfpm27uwktrzbspm

Limiting Disclosure in Hippocratic Databases [chapter]

Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Raghu Ramakrishnan, Yirong Xu, David DeWitt
2004 Proceedings 2004 VLDB Conference  
We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semantic tradeoffs introduced  ...  Through a comprehensive set of performance experiments, we show that the cost of privacy enforcement is small, and scalable to large databases.  ...  about choice storage and query modification, and to Ameet Kini and Diana Zhou for their work on the prototype implementation.  ... 
doi:10.1016/b978-012088469-8.50013-9 dblp:conf/vldb/LeFevreAERXD04 fatcat:pedywz2marcnzmj2wrf7elx2de

User-Centric Privacy Preservation Solution to Control Third Party Access in Digital Databases

Muditha Tissera, Samantha Thelijjagoda, Jeevani Goonathilake
2017 Zenodo  
However intelligent algorithms dynamically derive user sensitive database attributes to hide, when controlling third party access.  ...  Today, everything is e-enabled and human-linked information is digitally stored in digital databases, files and so on.  ...  Hippocratic database model which is designed to relational databases extended into the Hippocratic XML database model [16] .  ... 
doi:10.5281/zenodo.3951349 fatcat:wtkemiwecngbtewxjpkdxtkume

RFID enabled traceability networks: a survey

Yanbo Wu, Damith C. Ranasinghe, Quan Z. Sheng, Sherali Zeadally, Jian Yu
2011 Distributed and parallel databases  
We propose a set of criteria for analyzing and comparing the current existing techniques including system architectures and data models.  ...  As a non line of sight technology, RFID provides an effective way to record movements of objects within a networked RFID system formed by a set of distributed and collaborating parties.  ...  Access to ONS records is also controlled by strict access control mechanisms. Discovery Services (DS).  ... 
doi:10.1007/s10619-011-7084-9 fatcat:liqbc262zjdavbwjtzh3g7tvly

Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology

R. Agrawal, C. Johnson, J. Kiernan, F. Leymann
2006 22nd International Conference on Data Engineering (ICDE'06)  
We suggest that database technology can play an important role in assisting compliance with the internal control provisions of the Act.  ...  The Sarbanes-Oxley Act instituted a series of corporate reforms to improve the accuracy and reliability of financial reporting.  ...  We have also outlined important technical challenges and suggested topics for database research. We hope this work provides the basis for innovations that revolutionize internal control systems.  ... 
doi:10.1109/icde.2006.155 dblp:conf/icde/AgrawalJKL06 fatcat:mqeefvjgorfnlfi3ltfk4f2sby

Privacy-preserving data integration and sharing

Chris Clifton, Murat Kantarcioǧlu, AnHai Doan, Gunther Schadow, Jaideep Vaidya, Ahmed Elmagarmid, Dan Suciu
2004 Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery - DMKD '04  
Integrating data from multiple sources has been a longstanding challenge in the database community.  ...  Some of the privacy issues have been addressed for the case of a single database management system in Hippocratic Databases [3] .  ...  Database security has generally focused on access control: Users are explicitly (or perhaps implicitly) allowed certain types of access to a data item.  ... 
doi:10.1145/1008694.1008698 dblp:conf/dmkd/CliftonKDSVES04 fatcat:5zotyfq2ercnrkonhc2hh5rgd4

Download Complete Issue: CP54 (27MB)

Complete Issue
2006 Cartographic Perspectives  
There is, however, a general ethics that applies to mapmakers . . ." ACKNOWLEDGEMENTS REFERENCES cartographic perspectives  ...  The model is medicine's Hippocratic Oath, an ethical statement that has "served as a model for almost a hundred generations" (Nuland, 1988) .  ...  in the database).  ... 
doi:10.14714/cp54.336 fatcat:vrmndbcbqrhkdp6wx6b5iaptgq

Purpose based access control of complex data for privacy protection

Ji-Won Byun, Elisa Bertino, Ninghui Li
2005 Proceedings of the tenth ACM symposium on Access control models and technologies - SACMAT '05  
We recently proposed a privacy preserving access control model for relational databases, where purpose information associated with a given data element specifies the intended use of the data element.  ...  In this paper, we extend our previous work to handle other advanced data management systems, such as the ones based on XML and the ones based on the object-relational data model.  ...  Data Query and Query Compliance Users request an access to data by issuing a query.  ... 
doi:10.1145/1063979.1063998 dblp:conf/sacmat/ByunBL05 fatcat:obqqz5woovc4xkgnzho2aybtzm

Welcome Message from the General Chair

2006 International Conference on Dependable Systems and Networks (DSN'06)  
results and practical experiences among members of the international Databases community.  ...  The conference was a huge success for its time, attracting almost 100 papers and more than 150 participants. We have come a long way since then!  ...  compiled similar guides for ICSE 2001 and RE 2001, respectively  ... 
doi:10.1109/dsn.2006.75 dblp:conf/dsn/X06 fatcat:k4duddvbk5glboxkqxkkfsh4p4

Secure personal data servers

Tristan Allard, Shaoyi Yin, Nicolas Anciaux, Luc Bouganim, Yanli Guo, Lionel Le Folgoc, Benjamin Nguyen, Philippe Pucheral, Indrajit Ray, Indrakshi Ray
2010 Proceedings of the VLDB Endowment  
By embedding a full-fledged Personal Data Server in such devices, user control of how her sensitive data is shared by others (by whom, for how long, according to which rule, for which purpose) can be fully  ...  An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc.  ...  Acknowledgments: The authors wish to thank Anne Canteaut and Philippe Bonnet for their helpful comments on this paper.  ... 
doi:10.14778/1920841.1920850 fatcat:tab7ustvajeqbgewqin4oaayzy
« Previous Showing results 1 — 15 out of 72 results